exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2008-09-04

Secunia Security Advisory 31671
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in Najdi.si Toolbar, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c54e911e52b98f6c970c6adfc931db75da91183b34454486108a22d68bb05d30
Gentoo Linux Security Advisory 200809-4
Posted Sep 4, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-04 - Sergei Golubchik reported that MySQL imposes no restrictions on the specification of DATA DIRECTORY or INDEX DIRECTORY in SQL CREATE TABLE statements. Versions less than 5.0.60-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-2079
SHA-256 | 2dbc9c5c45f08d45bb6b0f11c315c3d80f8c1168e50b1c9ed4ff10ae02e743e0
Gentoo Linux Security Advisory 200809-3
Posted Sep 4, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-03 - Dyon Balding of Secunia Research reported an unspecified heap-based buffer overflow in the Shockwave Flash (SWF) frame handling. Versions less than 11.0.0.4028-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-5400
SHA-256 | a65d4052f0656b72303e36e5bc16d7194e4a524bbd4cdc389f12c5248564cdd5
Gentoo Linux Security Advisory 200809-2
Posted Sep 4, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-02 - Dan Kaminsky of IOActive reported that dnsmasq does not randomize UDP source ports when forwarding DNS queries to a recursing DNS server. Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash. Versions below 2.45 are affected.

tags | advisory, udp
systems | linux, gentoo
advisories | CVE-2008-3350, CVE-2008-1447
SHA-256 | ed1cca55454b5ba4e246627c0056fd8174c4cdebcacddb3a6fa5eae0bc89d4c0
Gentoo Linux Security Advisory 200809-1
Posted Sep 4, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-01 - Aaron Grattafiori reported a format string vulnerability in the window_error() function in yelp-window.c. Versions less than 2.22.1-r2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-3533
SHA-256 | 24a10ea5bdf2a4ff9cdea3ea50f1deaa4b92ed3040b6c7cb19d56f8ad21f429c
Secunia Security Advisory 31730
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco ASA and PIX appliances, which can be exploited by malicious people to disclose sensitive information, and by malicious users and malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 3840d086fb5370e5cd3169145c484c9cd23cc27758b55d96ca9636b5fbb5df0c
zencart138a-sql.txt
Posted Sep 4, 2008
Authored by James Bercegay | Site gulftech.org

Zen Cart versions 1.3.8a and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | be50c144a7bb9397136e61ebc33e8a71f17305cf9da35b26ea43ff0369df72ee
Secunia Security Advisory 31696
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hussin X has reported a vulnerability in Living Local Website, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, local, sql injection
SHA-256 | 6ae70bb7debe6df5fa2727ce718dde42d3b5fbe3223d3eb0980e6700b26182c6
Secunia Security Advisory 31739
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 268d06a5c59f68a7f4fa68a8ba58896341f3345a127393e0d5d7052cf993a2bb
Secunia Security Advisory 31742
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Astaro has acknowledged a vulnerability in Astaro Security Gateway, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 2060930f53753fc9e0414552607bd25a4f2bd73f96648fcc43813c71ad0279dd
Secunia Security Advisory 31743
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FreeBSD has acknowledged a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | freebsd
SHA-256 | 4247049d902e1a8abb713042cd2e0769813f31502e5cf65b108ad172d6dc4f00
Secunia Security Advisory 31745
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FreeBSD has acknowledged a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | freebsd
SHA-256 | d7cdd57faef9c1e52081bcb44c00a7dd0c97ccf88200d59b7fa906f8f996d279
atheros-overflow.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The wireless drivers in some Wi-Fi access points (such as the ATHEROS-based Linksys WRT350N) do not correctly parse the Atheros vendor specific information element included in association requests allowing for denial of service or possible code execution.

tags | advisory, denial of service, overflow, code execution
advisories | CVE-2007-5474
SHA-256 | 65bd74141ad942f7b06d4dba223152dea500c38738174396183436ef7ee12619
Clam AntiVirus Toolkit 0.94
Posted Sep 4, 2008
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Fixed a chm file parsing vulnerability.
tags | virus
systems | unix
advisories | CVE-2008-1389
SHA-256 | ae188c18936ea9154eb6a85ea553c29f4349ee3e95457055fae5fe1b981af602
qwicsitepro-sqlxss.txt
Posted Sep 4, 2008
Authored by Cr@zy_King

Qwicsite Pro suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 8f003017767e872b75a13f24620296f2e8be980ef0e8610ea7c699f6749894df
awstats-exec.txt
Posted Sep 4, 2008
Authored by Ricardo Almeida

Remote code execution exploit with an interactive shell for AWStats Totals versions 1.0 through 1.14.

tags | exploit, remote, shell, code execution
SHA-256 | 58c8589d3942aa78f4d807fe0a4236e3c9460076671b70e074a33f5382dd0187
Secunia Security Advisory 31729
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Django, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 20357544e02c278f8ec84a24aa1ab0f2ea68dd44298cd69d04522311e0f2b13e
Secunia Security Advisory 31735
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Celerondude Uploader, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | b410717bfadc46e34ae776de9c921e6eb247c43469ba289b12548407104ecc9e
clamav-chm.txt
Posted Sep 4, 2008
Authored by Hanno Boeck | Site hboeck.de

A fuzzing test against ClamAV versions below 0.94 discovered that they suffer from a chm file parsing vulnerability which can possibly be exploited.

tags | advisory
advisories | CVE-2008-1389
SHA-256 | e250a5f0d10ff7b3553d66f2c5e2679545b01252c627bd11aee974decdecce50
marvell-null.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from a NULL SSID association request vulnerability that allows for denial of service and possibly code execution.

tags | advisory, denial of service, code execution
advisories | CVE-2008-1197
SHA-256 | ccb13de54f066e877156a14ba07fa1ac4f865e9ef7de15ecd8de515a0d4f33f9
marvell-overflow.txt
Posted Sep 4, 2008
Authored by Laurent Butti, Julien Tinnes

The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from an overflow vulnerability when parsing malformed EAPoL-Key packets.

tags | advisory, overflow
advisories | CVE-2008-1144
SHA-256 | 38d2065be0b8a4aeb8224079f08d4c79ba5ac17ce0b4e9162721a30007efe569
google-chrome-dos2.txt
Posted Sep 4, 2008
Authored by LiquidWorm | Site zeroscience.mk

Google Chrome Browser version 0.2.149.27 denial of service exploit that uses javascript.

tags | exploit, denial of service, javascript
SHA-256 | 9e254f6f1e7154c0d0c7c6f6733565626adc2f9f4cb8134549838c9b0fa81146
google-download1.txt
Posted Sep 4, 2008
Authored by IMC Graham Phisher | Site insanemasterminds.com

Google Chrome Browser version 0.2.149.27 automatic file download exploit that uses a meta tag to automatically repeat downloading.

tags | exploit
SHA-256 | e7cdd9df31af9d2b59e4bc852ccb8e9dd06714e37798cae5cde75a8017614cab
google-chrome-dos1.txt
Posted Sep 4, 2008
Authored by IMC Graham Phisher | Site insanemasterminds.com

Google Chrome Browser version 0.2.149.27 denial of service exploit that uses javascript.

tags | exploit, denial of service, javascript
SHA-256 | 60f911fec2186b7c16645d62caaca45a72c4cf1de4f8683ac21bbcc08f8beff8
Nikto Web Scanner 2.03
Posted Sep 4, 2008
Authored by Sullo | Site cirt.net

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers.

Changes: Multiple enhancements.
tags | web, cgi
systems | unix
SHA-256 | 18eefcf70627d02ce9c1035df734f5598c68afc9a07f0bdcb4c0b186acf3c425
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close